Skip to content

Commit c1a6140

Browse files
committed
Merge sudo 1.9.16 from tip.
--HG-- branch : 1.9
2 parents a0a68f2 + 4751a4d commit c1a6140

File tree

273 files changed

+21844
-15677
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

273 files changed

+21844
-15677
lines changed

INSTALL.md

Lines changed: 27 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ Defaults are listed in brackets after the description.
240240
production environment.
241241

242242
--enable-pie
243-
Build sudo and related programs as as a position independent
243+
Build sudo and related programs as position independent
244244
executables (PIE). This improves the effectiveness of address
245245
space layout randomization (ASLR) on systems that support it.
246246
Sudo will create PIE binaries by default on Linux systems.
@@ -476,10 +476,6 @@ Defaults are listed in brackets after the description.
476476
Specify the path to the SSSD shared library, which is loaded
477477
at run-time.
478478

479-
--enable-offensive-insults
480-
Enable potentially offensive sudo insults from the classic
481-
version of sudo.
482-
483479
--enable-pvs-studio
484480
Generate a sample PVS-Studio.cfg file based on the compiler and
485481
platform type. The "pvs-studio" Makefile target can then be
@@ -811,14 +807,16 @@ Defaults are listed in brackets after the description.
811807

812808
--with-classic-insults
813809
Uses insults from sudo "classic." If you just specify --with-insults
814-
you will get the classic and CSOps insults. This is on by default if
815-
--with-insults is given.
810+
you will get the classic and CSOps insults. You must either specify
811+
--with-insults or enable insults in the sudoers file for this to have
812+
any effect.
816813

817814
--with-csops-insults
818815
Insults the user with an extra set of insults (some quotes, some
819-
original) from a sysadmin group at CU (CSOps). You must specify
820-
--with-insults as well for this to have any effect. This is on by
821-
default if --with-insults is given.
816+
original) from a sysadmin group at CU (CSOps). If you just specify
817+
--with-insults you will get the classic and CSOps insults. You
818+
must either specify --with-insults or enable insults in the sudoers
819+
file for this to have any effect.
822820

823821
--with-editor=PATH
824822
Specify the default editor path for use by visudo. This may be a
@@ -884,13 +882,19 @@ Defaults are listed in brackets after the description.
884882
Sudoers option: ignore_dot
885883

886884
--with-insults
887-
Define this if you want to be insulted for typing an incorrect password
888-
just like the original sudo(8). This is off by default.
885+
Define this if you want to be insulted by default for typing
886+
an incorrect password just like the original sudo(8).
887+
Insults may be optionally disabled in the sudoers file.
889888
Sudoers option: insults
890889

890+
--with-insults=no, --without-insults
891+
By default, sudo will include support for insults that can be
892+
enabled via the sudoers file. However, if --with-insults=no is
893+
used, no insults will be available, even if enabled in sudoers.
894+
891895
--with-insults=disabled
892896
Include support for insults but disable them unless explicitly
893-
enabled in sudoers.
897+
enabled in the sudoers file. This is the default.
894898
Sudoers option: !insults
895899

896900
--with-iologdir[=DIR]
@@ -995,9 +999,17 @@ Defaults are listed in brackets after the description.
995999
be separate from the "user path." You will need to customize the
9961000
path for your site. This is not applied to users in the group
9971001
specified by --with-exemptgroup. If you do not specify a path,
998-
"/bin:/usr/ucb:/usr/bin:/usr/sbin:/sbin:/usr/etc:/etc" is used.
1002+
"/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
1003+
is used.
9991004
Sudoers option: secure_path
10001005

1006+
--with-secure-path-value[=PATH]
1007+
Sets the value of "secure_path" that is substituted into
1008+
the default sudoers file. This option is intended to be
1009+
used by package maintainers who wish to set "secure_path"
1010+
to a system-specific value in the default sudoers file.
1011+
It does not actually enable "secure-path".
1012+
10011013
--with-sendmail=PATH
10021014
Override configure's guess as to the location of sendmail.
10031015
Sudoers option: mailerpath
@@ -1077,7 +1089,7 @@ You need to have a C compiler in order to build sudo. Since Solaris
10771089
does not come with one by default this means that you either need
10781090
to either install the Solaris Studio compiler suite, available for
10791091
free from www.oracle.com, or install the GNU C compiler (gcc) which
1080-
is can be installed via the pkg utility on Solaris 11 and higher
1092+
can be installed via the pkg utility on Solaris 11 and higher
10811093
and is distributed on the Solaris Companion CD for older Solaris
10821094
releases. You can also download gcc packages from
10831095
https://www.opencsw.org/packages/CSWgcc4core/.

LICENSE.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Sudo is distributed under the following license:
22

3-
Copyright (c) 1994-1996, 1998-2023
3+
Copyright (c) 1994-1996, 1998-2024
44
Todd C. Miller <Todd.Miller@sudo.ws>
55

66
Permission to use, copy, modify, and distribute this software for any
@@ -299,7 +299,7 @@ The file getentropy.c bears the following license:
299299

300300
The embedded copy of zlib bears the following license:
301301

302-
Copyright (C) 1995-2022 Jean-loup Gailly and Mark Adler
302+
Copyright (C) 1995-2024 Jean-loup Gailly and Mark Adler
303303

304304
This software is provided 'as-is', without any express or implied
305305
warranty. In no event will the authors be held liable for any damages

MANIFEST

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ docs/cvtsudoers.mdoc.in
3232
docs/fixman.sh
3333
docs/fixmdoc.sed
3434
docs/schema.ActiveDirectory
35+
docs/schema.IBM_LDAP
3536
docs/schema.OpenLDAP
3637
docs/schema.iPlanet
3738
docs/schema.olcSudo
@@ -716,6 +717,8 @@ plugins/sudoers/po/hr.mo
716717
plugins/sudoers/po/hr.po
717718
plugins/sudoers/po/hu.mo
718719
plugins/sudoers/po/hu.po
720+
plugins/sudoers/po/id.mo
721+
plugins/sudoers/po/id.po
719722
plugins/sudoers/po/it.mo
720723
plugins/sudoers/po/it.po
721724
plugins/sudoers/po/ja.mo

Makefile.in

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -221,20 +221,24 @@ depend: siglist.c signame.c tsgetusershell.c
221221
lib/util/Makefile.in lib/zlib/Makefile.in \
222222
lib/fuzzstub/Makefile.in lib/eventlog/Makefile.in \
223223
lib/iolog/Makefile.in lib/logsrv/Makefile.in logsrvd/Makefile.in \
224-
lib/protobuf-c/Makefile.in plugins/group_file/Makefile.in \
225-
plugins/sample/Makefile.in plugins/sudoers/Makefile.in \
226-
plugins/system_group/Makefile.in plugins/python/Makefile.in \
227-
src/Makefile.in && \
224+
lib/protobuf-c/Makefile.in lib/ssl_compat/Makefile.in \
225+
plugins/group_file/Makefile.in plugins/audit_json/Makefile.in \
226+
plugins/sample/Makefile.in plugins/sample_approval/Makefile.in \
227+
plugins/sudoers/Makefile.in plugins/system_group/Makefile.in \
228+
plugins/python/Makefile.in src/Makefile.in && \
228229
$(top_builddir)/config.status --file $(top_builddir)/lib/util/Makefile \
229230
--file $(top_builddir)/lib/zlib/Makefile \
230-
--file $(top_builddir)/lib/eventlog/Makefile \
231231
--file $(top_builddir)/lib/fuzzstub/Makefile \
232+
--file $(top_builddir)/lib/eventlog/Makefile \
232233
--file $(top_builddir)/lib/iolog/Makefile \
233234
--file $(top_builddir)/lib/logsrv/Makefile \
234235
--file $(top_builddir)/lib/protobuf-c/Makefile \
236+
--file $(top_builddir)/lib/ssl_compat/Makefile \
235237
--file $(top_builddir)/logsrvd/Makefile \
236-
--file $(top_builddir)/plugins/sample/Makefile \
237238
--file $(top_builddir)/plugins/group_file/Makefile \
239+
--file $(top_builddir)/plugins/audit_json/Makefile \
240+
--file $(top_builddir)/plugins/sample/Makefile \
241+
--file $(top_builddir)/plugins/sample_approval/Makefile \
238242
--file $(top_builddir)/plugins/sudoers/Makefile \
239243
--file $(top_builddir)/plugins/system_group/Makefile \
240244
--file $(top_builddir)/plugins/python/Makefile \

NEWS

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,72 @@
1+
What's new in Sudo 1.9.16
2+
3+
* Added the "cmddenial_message" sudoers option to provide additional
4+
information to the user when a command is denied by the sudoers
5+
policy. The default message is still displayed.
6+
7+
* The time stamp used for file-based logs is now more consistent
8+
with the time stamp produced by syslog. GitHub issues #327.
9+
10+
* Sudo will now warn the user if it can detect the user's terminal
11+
but cannot determine the path to the terminal device. The sudoers
12+
time stamp file will now use the terminal device number directly.
13+
GitHub issue #329.
14+
15+
* The embedded copy of zlib has been updated to version 1.3.1.
16+
17+
* Improved error handling if generating the list of signals and signal
18+
names fails at build time.
19+
20+
* Fixed a compilation issue on Linux systems without process_vm_readv().
21+
22+
* Fixed cross-compilation with WolfSSL.
23+
24+
* Added a "json_compact" value for the sudoers "log_format" option
25+
which can be used when logging to a file. The existing "json"
26+
value has been aliased to "json_pretty". In a future release,
27+
"json" will be an alias for "json_compact". GitHub issue #357.
28+
29+
* A new "pam_silent" sudoers option has been added which may be
30+
negated to avoid suppressing output from PAM authentication modules.
31+
GitHub issue #216.
32+
33+
* Fixed several cvtsudoers JSON output problems.
34+
GitHub issues #369, #370, #371, #373, #381.
35+
36+
* When sudo runs a command in a pseudo-terminal and the user's
37+
terminal is revoked, the pseudo-terminal's foreground process
38+
group will now receive SIGHUP before the terminal is revoked.
39+
This emulates the behavior of the session leader exiting and is
40+
consistent with what happens when, for example, an ssh session
41+
is closed. GitHub issue #367.
42+
43+
* Fixed "make test" with Python 3.12. GitHub issue #374.
44+
45+
* In schema.ActiveDirectory, fixed the quoting in the example command.
46+
GitHub issue #376.
47+
48+
* Paths specified via a Chdir_Spec or Chroot_Spec in sudoers may
49+
now be double-quoted.
50+
51+
* Sudo insults are now included by default, but disabled unless
52+
the --with-insults configure option is specified or the "insults"
53+
sudoers option is enabled.
54+
55+
* The default sudoers file now enables the "secure_path" option by
56+
default and preserves the EDITOR, VISUAL, and SUDO_EDITOR environment
57+
variables when running visudo. The new --with-secure-path-value
58+
configure option can be used to set the value of "secure_path" in
59+
the default sudoers file. GitHub issue #387.
60+
61+
* A sudoers schema for IBM Directory Server (aka IBM Tivoli Directory
62+
Server, IBM Security Directory Server, and IBM Security Verify
63+
Directory) is now included.
64+
65+
* When cross-compiling sudo, the configure script now assumes that
66+
the snprintf() function is C99-compliant if the C compiler
67+
supports the C99 standard. Previously, configure would use
68+
sudo's own snprintf() when cross-compiling. GitHub issue #386.
69+
170
What's new in Sudo 1.9.15p5
271

372
* Fixed evaluation of the "lecture", "listpw", "verifypw", and

README.LDAP.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,8 +96,17 @@ copy the schema.iPlanet file to the schema directory with the name 99sudo.ldif.
9696
On Solaris, schemas are stored in /var/Sun/mps/slapd-\`hostname\`/config/schema/.
9797
For Fedora Directory Server, they are stored in /etc/dirsrv/schema/.
9898

99-
After copying the schema file to the appropriate directory, restart
100-
the LDAP server.
99+
For IBM Directory Server, IBM Tivoli Directory Server, IBM Security
100+
Directory Server, and IBM Security Verify Directory, the schema is
101+
supplied in LDIF format. It can be installed using the ldapmodify
102+
utility:
103+
104+
# ldapmodify -c -f schema.IBM_LDAP -h ldapserver:port -w passwod \
105+
-D cn=Manager,dc=example,dc=com
106+
107+
For schema files other than schema.olcSudo and schema.IBM_LDAP, you
108+
will need to restart the LDAP server after copying the schema file
109+
into place.
101110

102111
Finally, using an LDAP browser/editor, enable indexing by editing the
103112
client profile to provide a Service Search Descriptor (SSD) for sudoers,

config.h.in

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1203,10 +1203,6 @@
12031203
/* Define if your C preprocessor does not support variadic macros. */
12041204
#undef NO_VARIADIC_MACROS
12051205

1206-
/* Define to 1 to include offensive insults from the classic version of sudo.
1207-
*/
1208-
#undef OFFENSIVE_INSULTS
1209-
12101206
/* Define to the address where bug reports for this package should be sent. */
12111207
#undef PACKAGE_BUGREPORT
12121208

0 commit comments

Comments
 (0)